CVE-2025-36460: CWE-805 - Buffer Access with Incorrect Length Value in Broadcom BCM5820X
Multiple out-of-bounds read and write vulnerabilities exist in the ControlVault WBDI Driver Broadcom Storage Adapter functionality of Dell ControlVault3 prior to 5.15.14.19 and Dell ControlVault3 Plus prior to 6.2.36.47. A specially crafted WinBioControlUnit call can lead to memory corruption. An attacker can issue an api call to trigger this vulnerability. This vulnerability is triggered when submitting a `WinBioControlUnit` call to the StorageAdapter with the ControlCode 2 (`WBIO_USH_GET_IDENTITY`) with an improper `ReceiveBuferSize` value.
AI Analysis
Technical Summary
CVE-2025-36460 is a vulnerability classified under CWE-805, indicating buffer access with incorrect length values, specifically in the Broadcom BCM5820X component integrated into Dell ControlVault3 and ControlVault3 Plus devices. The flaw arises from multiple out-of-bounds read and write conditions within the ControlVault WBDI Driver's Storage Adapter functionality. An attacker with local privileges can exploit this vulnerability by issuing a crafted WinBioControlUnit API call to the StorageAdapter, particularly using ControlCode 2 (WBIO_USH_GET_IDENTITY) with an improper ReceiveBufferSize parameter. This malformed input causes the driver to perform memory operations beyond allocated buffer boundaries, leading to memory corruption. The consequences of such corruption include potential arbitrary code execution, privilege escalation, or denial of service. The vulnerability requires low attack complexity but does need local privileges and user interaction, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:R). The CVSS score of 7.3 reflects a high severity due to the combined impact on confidentiality, integrity, and availability. Currently, there are no known exploits in the wild, and no patches have been linked yet, emphasizing the need for vigilance and prompt remediation once updates are released.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially those relying on Dell hardware with Broadcom BCM5820X components for biometric authentication and security functions. Exploitation could allow attackers to corrupt memory, potentially leading to unauthorized access to sensitive biometric data, system compromise, or disruption of authentication services. This could undermine trust in identity verification systems, impacting sectors such as finance, healthcare, government, and critical infrastructure. The requirement for local privileges and user interaction somewhat limits remote exploitation but does not eliminate risk, particularly in environments where insider threats or social engineering attacks are plausible. The high impact on confidentiality, integrity, and availability could result in data breaches, operational downtime, and regulatory non-compliance under GDPR and other European data protection laws.
Mitigation Recommendations
Organizations should prioritize monitoring for updates from Dell and Broadcom addressing this vulnerability and apply patches immediately upon release. Until patches are available, restrict access to the affected ControlVault devices and the WinBioControlUnit API, limiting usage to trusted users and processes. Implement strict local access controls and user privilege management to reduce the risk of exploitation. Employ endpoint detection and response (EDR) solutions to monitor for anomalous API calls or memory corruption indicators. Conduct user awareness training to mitigate social engineering risks that could lead to local exploitation. Additionally, review and harden biometric authentication configurations to minimize exposure. Regularly audit systems for unauthorized changes or suspicious activity related to ControlVault components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-36460: CWE-805 - Buffer Access with Incorrect Length Value in Broadcom BCM5820X
Description
Multiple out-of-bounds read and write vulnerabilities exist in the ControlVault WBDI Driver Broadcom Storage Adapter functionality of Dell ControlVault3 prior to 5.15.14.19 and Dell ControlVault3 Plus prior to 6.2.36.47. A specially crafted WinBioControlUnit call can lead to memory corruption. An attacker can issue an api call to trigger this vulnerability. This vulnerability is triggered when submitting a `WinBioControlUnit` call to the StorageAdapter with the ControlCode 2 (`WBIO_USH_GET_IDENTITY`) with an improper `ReceiveBuferSize` value.
AI-Powered Analysis
Technical Analysis
CVE-2025-36460 is a vulnerability classified under CWE-805, indicating buffer access with incorrect length values, specifically in the Broadcom BCM5820X component integrated into Dell ControlVault3 and ControlVault3 Plus devices. The flaw arises from multiple out-of-bounds read and write conditions within the ControlVault WBDI Driver's Storage Adapter functionality. An attacker with local privileges can exploit this vulnerability by issuing a crafted WinBioControlUnit API call to the StorageAdapter, particularly using ControlCode 2 (WBIO_USH_GET_IDENTITY) with an improper ReceiveBufferSize parameter. This malformed input causes the driver to perform memory operations beyond allocated buffer boundaries, leading to memory corruption. The consequences of such corruption include potential arbitrary code execution, privilege escalation, or denial of service. The vulnerability requires low attack complexity but does need local privileges and user interaction, as indicated by the CVSS vector (AV:L/AC:L/PR:L/UI:R). The CVSS score of 7.3 reflects a high severity due to the combined impact on confidentiality, integrity, and availability. Currently, there are no known exploits in the wild, and no patches have been linked yet, emphasizing the need for vigilance and prompt remediation once updates are released.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially those relying on Dell hardware with Broadcom BCM5820X components for biometric authentication and security functions. Exploitation could allow attackers to corrupt memory, potentially leading to unauthorized access to sensitive biometric data, system compromise, or disruption of authentication services. This could undermine trust in identity verification systems, impacting sectors such as finance, healthcare, government, and critical infrastructure. The requirement for local privileges and user interaction somewhat limits remote exploitation but does not eliminate risk, particularly in environments where insider threats or social engineering attacks are plausible. The high impact on confidentiality, integrity, and availability could result in data breaches, operational downtime, and regulatory non-compliance under GDPR and other European data protection laws.
Mitigation Recommendations
Organizations should prioritize monitoring for updates from Dell and Broadcom addressing this vulnerability and apply patches immediately upon release. Until patches are available, restrict access to the affected ControlVault devices and the WinBioControlUnit API, limiting usage to trusted users and processes. Implement strict local access controls and user privilege management to reduce the risk of exploitation. Employ endpoint detection and response (EDR) solutions to monitor for anomalous API calls or memory corruption indicators. Conduct user awareness training to mitigate social engineering risks that could lead to local exploitation. Additionally, review and harden biometric authentication configurations to minimize exposure. Regularly audit systems for unauthorized changes or suspicious activity related to ControlVault components.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2025-04-15T21:17:08.088Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691ba72ebb922d226277cd87
Added to database: 11/17/2025, 10:52:30 PM
Last enriched: 11/24/2025, 11:11:33 PM
Last updated: 1/7/2026, 5:22:50 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.